Risk | High |
Patch available | YES |
Number of vulnerabilities | 2 |
CVE-ID | CVE-2020-1762 CVE-2020-1764 |
CWE-ID | CWE-613 CWE-321 |
Exploitation vector | Network |
Public exploit | Public exploit code for vulnerability #2 is available. |
Vulnerable software Subscribe |
Kiali Client/Desktop applications / Other client software |
Vendor | Kiali |
Security Bulletin
This security bulletin contains information about 2 vulnerabilities.
EUVDB-ID: #VU27379
Risk: High
CVSSv3.1: 7.5 [CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H/E:U/RL:O/RC:C]
CVE-ID: CVE-2020-1762
CWE-ID:
CWE-613 - Insufficient Session Expiration
Exploit availability: No
DescriptionThe vulnerability allows a remote attacker to gain access to sensitive information.
The vulnerability exists due to an insufficient JWT validation. A remote non-authenticated attacker can steal a valid JWT cookie and gain unauthorized access to session that belongs to another user, possibly gain privileges to view and alter the Istio configuration.
MitigationInstall updates from vendor's website.
Vulnerable software versionsKiali: 0.4.0 - 1.15.0
External linkshttp://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-1762
http://kiali.io/news/security-bulletins/kiali-security-001/
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU27380
Risk: High
CVSSv3.1: 7.7 [CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H/E:P/RL:O/RC:C]
CVE-ID: CVE-2020-1764
CWE-ID:
CWE-321 - Use of Hard-coded Cryptographic Key
Exploit availability: Yes
DescriptionThe vulnerability allows a remote attacker to gain unauthorized access to the system.
The vulnerability exists due to presence of a hard-coded cryptographic key in the default configuration file. A remote attacker can create their own JWT signed tokens and bypass Kiali authentication mechanisms, possibly gaining privileges to view and alter the Istio configuration.
MitigationInstall updates from vendor's website.
Vulnerable software versionsKiali: 0.4.0 - 1.15.0
External linkshttp://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-1764
http://kiali.io/news/security-bulletins/kiali-security-001/
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability. However, proof of concept for this vulnerability is available.